Latest revision as of 14:48, 23 January 2014

Main

Overview

Web applications face any number of threats; one of them is cross-site scripting and related injection attacks. 90% of all web applications contain cross-site scripting vulnerabilities because they are easy to introduce, and the proper tools are not always available to prevent them. The Reform library provides a solid set of functions for encoding output for the most common context targets in web applications (e.g. HTML, XML, JavaScript, etc). The library also takes a conservative view of what are allowable characters based on historical vulnerabilities, and current injection techniques.

Future Development

News

OWASP is adopting the Reform Encoding Library as an OWASP project. We are currently in the process of moving over the source, downloads, and documentation.

OWASP Encoding Project Created! - 10:01, 8 November 2006 (EST)

The Open Web Application Security Project is proud to announce the OWASP Encoding Project!

Feedback and Participation:

We hope you find the OWASP Encoding Project useful. Please contribute to the Project by volunteering for one of the tasks, sending your comments, questions, and suggestions to owasp@owasp.org. To join the OWASP Encoding Project mailing list or view the archives, please visit the subscription page.